CowboyForever (@netspheredreams) 's Twitter Profile
CowboyForever

@netspheredreams

Cybersecurity Researcher

ID: 1166811159313440770

calendar_today28-08-2019 20:34:16

2,2K Tweet

109 Takipçi

84 Takip Edilen

CowboyForever (@netspheredreams) 's Twitter Profile Photo

I'm currently the sec guy on a DevOps team and there’s this girl who was horrified when she saw me writing a python script on notepad++ They all use vscode along with 30+ plugins and AI integrated with real time code

cryphixer (@cryphixer) 's Twitter Profile Photo

Honestly I'm so tired of the BreachForums bs. Let it Die. Make something new. pastebin.com/raw/EDUtVYq2 (statement from shiny) Here is the github of "Yukari" github.com/ldpreload

Honestly I'm so tired of the BreachForums bs. Let it Die. Make something new.

pastebin.com/raw/EDUtVYq2

(statement from shiny)

Here is the github of "Yukari"

github.com/ldpreload
tooManyOpenThreats (@ownerprocessid_) 's Twitter Profile Photo

🇧🇷Looks like the “PhoneManager” component of this app is far from innocent, it hooks into PHONE_STATE & NEW_OUTGOING_CALL to answer/end/initiate calls, and queries content://sms/inbox to grab sender numbers & embedded URLs, sending them to a remote server. SMS & call control in

🇧🇷Looks like the “PhoneManager” component of this app is far from innocent, it hooks into PHONE_STATE & NEW_OUTGOING_CALL to answer/end/initiate calls, and queries content://sms/inbox to grab sender numbers & embedded URLs, sending them to a remote server. SMS & call control in
tooManyOpenThreats (@ownerprocessid_) 's Twitter Profile Photo

Massive #Magecart campaign in Brazil: 3 skimmer modules on major e-commerce sites, all exfiltrating to the same C2. Customized for different checkout flows, one variant even stole the CPF along with card data. Awesome report by eremit4